The following pages link to Gaëtan Leurent (Q784992):
Displayed 50 items.
- Universal forgery attack against GCM-RUP (Q784994) (← links)
- On the cost of ASIC hardware crackers: a SHA-1 case study (Q826307) (← links)
- The Missing Difference problem, and its applications to counter mode encryption (Q1648860) (← links)
- Generic attacks against beyond-birthday-bound MACs (Q1673397) (← links)
- Improved generic attacks against hash-based MACs and HAIFA (Q1688402) (← links)
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} (Q2051403) (← links)
- New representations of the AES key schedule (Q2056670) (← links)
- Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 (Q2056728) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- Practical key recovery attacks on FlexAEAD (Q2119949) (← links)
- Generic attacks on hash combiners (Q2188959) (← links)
- From collisions to chosen-prefix collisions application to full SHA-1 (Q2292706) (← links)
- Low-memory attacks against two-round Even-Mansour using the 3-XOR problem (Q2304983) (← links)
- Practical key-recovery attack against APOP, an MD5-based challenge-response authentication (Q2379114) (← links)
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions (Q2692336) (← links)
- Collision Attacks Against CAESAR Candidates (Q2795988) (← links)
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function (Q2798614) (← links)
- Cryptanalysis of Feistel Networks with Secret Round Functions (Q2807198) (← links)
- Differential Forgery Attack Against LAC (Q2807208) (← links)
- Construction of Lightweight S-Boxes Using Feistel and MISTY Structures (Q2807223) (← links)
- Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning (Q2820489) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Construction of Differential Characteristics in ARX Designs Application to Skein (Q2845676) (← links)
- New Generic Attacks against Hash-Based MACs (Q2867143) (← links)
- Improved Generic Attacks against Hash-Based MACs and HAIFA (Q2874502) (← links)
- New Insights on Impossible Differential Cryptanalysis (Q2889875) (← links)
- Boomerang Attacks on Hash Function Using Auxiliary Differentials (Q2890006) (← links)
- Narrow-Bicliques: Cryptanalysis of Full IDEA (Q2894420) (← links)
- Cryptanalysis of WIDEA (Q2946870) (← links)
- Time-Memory Trade-Offs for Near-Collisions (Q2946879) (← links)
- LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations (Q2946901) (← links)
- SPRING: Fast Pseudorandom Functions from Rounded Ring Products (Q2946902) (← links)
- The Sum Can Be Weaker Than Each Part (Q2948334) (← links)
- Practical Near-Collisions on the Compression Function of BMW (Q3013087) (← links)
- Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 (Q3084241) (← links)
- Security Analysis of SIMD (Q3084266) (← links)
- How Risky Is the Random-Oracle Model? (Q3183579) (← links)
- Cryptanalysis of the “Kindle” Cipher (Q3455490) (← links)
- Message Freedom in MD4 and MD5 Collisions: Application to APOP (Q3524899) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 (Q3558326) (← links)
- Cryptanalysis of ESSENCE (Q3577956) (← links)
- Another Look at Complementation Properties (Q3577970) (← links)
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 (Q3612542) (← links)
- Key Recovery Attack Against 2.5-Round $$\pi $$ -Cipher (Q4639497) (← links)
- Analysis of Differential Attacks in ARX Constructions (Q4911588) (← links)
- Practical Key Recovery Attack against Secret-IV Edon- $\mathcal R$ (Q5189460) (← links)
- FPGA Implementations of SPRING (Q5265091) (← links)
- Hardware Implementation and Side-Channel Analysis of Lapin (Q5404753) (← links)
- An Analysis of the XSL Algorithm (Q5451078) (← links)